CN103530153B - User power utilization information acquisition terminal remote upgrade method - Google Patents
User power utilization information acquisition terminal remote upgrade method Download PDFInfo
- Publication number
- CN103530153B CN103530153B CN201310471577.6A CN201310471577A CN103530153B CN 103530153 B CN103530153 B CN 103530153B CN 201310471577 A CN201310471577 A CN 201310471577A CN 103530153 B CN103530153 B CN 103530153B
- Authority
- CN
- China
- Prior art keywords
- whole
- main website
- files
- acquisition terminal
- upgrading terminals
- Prior art date
Links
- 238000000034 methods Methods 0.000 claims description 28
- 230000000875 corresponding Effects 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 10
- 230000002159 abnormal effects Effects 0.000 claims description 5
- 238000002360 preparation methods Methods 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 4
- 206010048669 Terminal state Diseases 0.000 claims description 3
- 238000003860 storage Methods 0.000 claims description 3
- 238000009826 distribution Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 280000174388 State Grid Corporation of China companies 0.000 description 1
- 238000004364 calculation methods Methods 0.000 description 1
- 230000003247 decreasing Effects 0.000 description 1
- 238000010586 diagrams Methods 0.000 description 1
- 238000005516 engineering processes Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000004801 process automation Methods 0.000 description 1
- 230000000630 rising Effects 0.000 description 1
- 230000001131 transforming Effects 0.000 description 1
Abstract
The present invention relates to user power utilization information acquisition terminal remote upgrade method, including: main website selects an acquisition terminal to be current upgrading terminals;Main website sends each frame blocks of files and single frames verification data to current upgrading terminals;Current upgrading terminals verifies each frame blocks of files;Main website sends whole file verification data to current upgrading terminals;Current upgrading terminals verifies whole program upgrade file;Current upgrading terminals upgrading processing terminates;Main station judging the most all acquisition terminals upgrading processing terminates, if otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.The present invention can realize the remote upgrade to acquisition terminal and safeguard, thoroughly overcomes the defect of tradition upgrade method.
Description
Technical field
The present invention relates to a kind of user power utilization information acquisition terminal remote upgrade method, remote upgrade maintenance terminal can be realized
Equipment.
Background technology
According to the applicant understood, user power utilization information acquisition system can be national grid " SG186 engineering " provide user in real time/
History power information data, it is possible to provide distribution transformer, common transformer, rural comprehensive for low and medium voltage distribution network, rural power grid
Real-time/the historical data of transformer etc. and operating mode ruuning situation.User power utilization information acquisition system can be by built electric power
Communication network, provides in real time/history power information quickly and easily, strengthens self work for State Grid Corporation of China and carries to client
Data supporting is provided for high-quality power supply service.
User power utilization information acquisition system generally includes the acquisition terminal being dispersed in each collection point, and leads to acquisition terminal
The main website server that letter connects.During safeguarding user power utilization information acquisition system, often increase function, solution because of demand change
The reasons such as the most on-the-spot operation problem, optimization program circuit, need to implement each acquisition terminal upgrade maintenance operation.Traditional upgrading
Mode is " artificial local upgrade " mode, is i.e. carried out this by technical support personnel's carried terminal ROMPaq to acquisition terminal scene
Ground upgrading.But, owing to acquisition terminal quantity is many, distributional region is wide, decentralization is high, field running environment is poor, this traditional
Upgrading mode cannot meet the requirement of batch processing, high-timeliness, and upgrade every time and all can take substantial amounts of manpower and materials money
Source, adds the operation cost of user power utilization information acquisition system.
Summary of the invention
The technical problem to be solved is: the problem existed for prior art, proposes a kind of user power utilization letter
Breath acquisition terminal remote upgrade method, it is achieved safeguard the remote upgrade of acquisition terminal, thoroughly overcomes lacking of tradition upgrade method
Fall into.
The technical scheme that the present invention solves its technical problem is as follows:
A kind of user power utilization information acquisition terminal remote upgrade method, is characterized in that, comprise the following steps:
The first step, main website select an acquisition terminal to be current upgrading terminals;
Second step, main website are sent each frame being split to form in advance by whole program upgrade file to current upgrading terminals by frame
Blocks of files and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is pressed
Described single frames checking algorithm verifies each frame blocks of files;
3rd step, main website send corresponding with whole program upgrade file through whole file verification algorithm to current upgrading terminals
The whole file verification data drawn;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates,
If otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.
Applicant finds in long-term in depth practical studies, although the size of acquisition terminal program upgrade file only has number
Hundred KB are to number MB, but limited by the transmission of power communication net, it is impossible to disposably send program upgrade file to acquisition terminal,
Program upgrade file can only be divided into some frame blocks of files, then send frame by frame to acquisition terminal.For guaranteeing this transmission mode
Safety and reliability, applicant works out further and every frame blocks of files first performs verification, then to whole program upgrading literary composition
Part performs the technological means of verification, ensures that program upgrade file sends like clockwork to acquisition terminal with this, it is to avoid data
The possibility being stolen and usurp, farthest protects the safety of power information.
The technical scheme that the present invention is the most perfect is as follows:
Preferably, in second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve
To variable W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data carried out XOR with variable W_CRC2,
Income value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable
W_CRC;Described cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Described close
The initial sequence number of code table is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise turning
To S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
Preferably, in the 3rd step, the whole file verification algorithm detailed process for whole program upgrade file is as follows:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, institute
Must be worth and preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise turning
To T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
Above single frames checking algorithm and whole file verification algorithm are that applicant draws through going deep into practical studies further
Be specially adapted for the checking algorithm of acquisition terminal program upgrade file, can be further assured that program upgrade file security and can
By property.
Preferably, the detailed process of second step is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends corresponding with kth frame blocks of files through single frames
The single frames verification data that checking algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges
Whether it is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message, main website record to main website
Current upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns to retransmit to main website and asks
Asking, main website makes frame re-transmission frequency n=n+1, and judge n whether more than predetermined value, if the then current upgrading terminals of main website record the
K frame blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step,
If otherwise going to A2.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can effectively guarantee each frame file
The security of block, can feed back the abnormal acquisition terminal of upgrading in time, be easy to overhaul the most in time, moreover it is possible to record gathers eventually
End downloading process, be easy to when communication condition is poor realize breakpoint transmission.
Preferably, the detailed process of the 3rd step is as follows:
B1. main website sends through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals
Whole file verification data;
B2. current upgrading terminals is calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm
According to, and judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record is current
Upgrading terminals whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to from temporary storage area by program upgrade file
Formal application area, is then calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm
According to, and judge whether to be consistent with the whole file verification data received;If being consistent, the current upgrading terminals of main website record upgrades successfully,
Go to the 4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can effectively guarantee whole program
The security of upgrade file, can feed back the abnormal acquisition terminal of upgrading in time, be easy to overhaul the most in time.
Preferably, the main website preparation process being positioned at before the first step, the detailed process of described main website preparation process are also included
As follows:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;Program is upgraded
File division is some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step;
The detailed process of the described first step is: main website selects an acquisition terminal for currently to upgrade end in upgrading terminals inventory
End;
Also include being positioned at the main website subsequent processing steps after the 4th step, the detailed process of described main website subsequent processing steps
As follows: each acquisition terminal program version in inquiry upgrading terminals inventory, and contrast with the version of this secondary program upgrade file, by version
The inconsistent acquisition terminal state recording of this contrast is that upgrade status is abnormal, and version contrasts consistent acquisition terminal communication channel
Switch to information gathering channel.
Above-mentioned optimal technical scheme is that applicant draws through going deep into practical studies further, can make whole remote upgrade mistake
Process automation, procedure process, thus the workload of equipment operation maintenance personnel is greatly decreased further, improve acquisition terminal remote
The operating efficiency of journey upgrading.
Accompanying drawing explanation
Fig. 1 is the main process schematic diagram of the embodiment of the present invention.
Detailed description of the invention
It is described in further detail with reference to the accompanying drawings and in conjunction with the embodiments to the present invention.But the invention is not restricted to
The example gone out.
Embodiment
As it is shown in figure 1, the user power utilization information acquisition terminal remote upgrade method of the present embodiment, comprise the following steps:
Main website preparation process:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;Program is upgraded
File division is some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step.
The first step, main website select an acquisition terminal to be current upgrading terminals in upgrading terminals inventory.
Second step, main website are sent each frame being split to form in advance by whole program upgrade file to current upgrading terminals by frame
Blocks of files and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is pressed
Described single frames checking algorithm verifies each frame blocks of files;
Detailed process is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends corresponding with kth frame blocks of files through single frames
The single frames verification data that checking algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges
Whether it is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message, main website record to main website
Current upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns to retransmit to main website and asks
Asking, main website makes frame re-transmission frequency n=n+1, and judge n whether more than predetermined value, if the then current upgrading terminals of main website record the
K frame blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step,
If otherwise going to A2.
3rd step, main website send corresponding with whole program upgrade file through whole file verification algorithm to current upgrading terminals
The whole file verification data drawn;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
Detailed process is as follows:
B1. main website sends through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals
Whole file verification data;
B2. current upgrading terminals is calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm
According to, and judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record is current
Upgrading terminals whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to from temporary storage area by program upgrade file
Formal application area, is then calculated the whole file verification number of whole program upgrade file by described whole file verification algorithm
According to, and judge whether to be consistent with the whole file verification data received;If being consistent, the current upgrading terminals of main website record upgrades successfully,
Go to the 4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates,
If otherwise selecting next acquisition terminal to be current upgrading terminals and go to second step, if then remote upgrade terminates.
Main website subsequent processing steps: inquiry upgrading terminals inventory in each acquisition terminal program version, and with this secondary program liter
The version contrast of level file, it is that upgrade status is abnormal that version contrasts inconsistent acquisition terminal state recording, is contrasted by version
Consistent acquisition terminal communication channel switches to information gathering channel.
Wherein, in second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve
To variable W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data carried out XOR with variable W_CRC2,
Income value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable
W_CRC;Cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Rising of cipher table
Beginning sequence number is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise turning
To S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
For ease of understanding single frames checking algorithm, lift an application example:
Certain frame blocks of files contains two byte datas, and the 1st byte data is 10110011, and the 2nd byte data is 01011010.Left
Moving is logical shift left, moves to right as logic shift right.
Cipher table is as shown in the table, and containing 256 hexadecimal values, order also represents with hexadecimal values:
Order | 00 | 01 | 02 | 03 | 04 | 05 | 06 | 07 | 08 | 09 |
Numerical value | 0x0000 | 0x365e | 0x6cbc | 0x5ae2 | 0xd978 | 0xef26 | 0xb5c4 | 0x839a | 0xff89 | 0xc9d7 |
Order | 0A | 0B | 0C | 0D | 0E | 0F | 10 | 11 | 12 | 13 |
Numerical value | 0x9335 | 0xa56b | 0x26f1 | 0x10af | 0x4a4d | 0x7c13 | 0xb26b | 0x8435 | 0xded7 | 0xe889 |
Order | 14 | 15 | 16 | 17 | 18 | 19 | 1A | 1B | 1C | 1D |
Numerical value | 0x6b13 | 0x5d4d | 0x07af | 0x31f1 | 0x4de2 | 0x7bbc | 0x215e | 0x1700 | 0x949a | 0xa2c4 |
Order | 1E | 1F | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 |
Numerical value | 0xf826 | 0xce78 | 0x29af | 0x1ff1 | 0x4513 | 0x734d | 0xf0d7 | 0xc689 | 0x9c6b | 0xaa35 |
Order | 28 | 29 | 2A | 2B | 2C | 2D | 2E | 2F | 30 | 31 |
Numerical value | 0xd626 | 0xe078 | 0xba9a | 0x8cc4 | 0x0f5e | 0x3900 | 0x63e2 | 0x55bc | 0x9bc4 | 0xad9a |
Order | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 3A | 3B |
Numerical value | 0xf778 | 0xc126 | 0x42bc | 0x74e2 | 0x2e00 | 0x185e | 0x644d | 0x5213 | 0x08f1 | 0x3eaf |
Order | 3C | 3D | 3E | 3F | 40 | 41 | 42 | 43 | 44 | 45 |
Numerical value | 0xbd35 | 0x8b6b | 0xd189 | 0xe7d7 | 0x535e | 0x6500 | 0x3fe2 | 0x09bc | 0x8a26 | 0xbc78 |
Order | 46 | 47 | 48 | 49 | 4A | 4B | 4C | 4D | 4E | 4F |
Numerical value | 0xe69a | 0xd0c4 | 0xacd7 | 0x9a89 | 0xc06b | 0xf635 | 0x75af | 0x43f1 | 0x1913 | 0x2f4d |
Order | 50 | 51 | 52 | 53 | 54 | 55 | 56 | 57 | 58 | 59 |
Numerical value | 0xe135 | 0xd76b | 0x8d89 | 0xbbd7 | 0x384d | 0x0e13 | 0x54f1 | 0x62af | 0x1ebc | 0x28e2 |
Order | 5A | 5B | 5C | 5D | 5E | 5F | 60 | 61 | 62 | 63 |
Numerical value | 0x7200 | 0x445e | 0xc7c4 | 0xf19a | 0xab78 | 0x9d26 | 0x7af1 | 0x4caf | 0x164d | 0x2013 |
Order | 64 | 65 | 66 | 67 | 68 | 69 | 6A | 6B | 6C | 6D |
Numerical value | 0xa389 | 0x95d7 | 0xcf35 | 0xf96b | 0x8578 | 0xb326 | 0xe9c4 | 0xdf9a | 0x5c00 | 0x6a5e |
Order | 6E | 6F | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 |
Numerical value | 0x30bc | 0x06e2 | 0xc89a | 0xfec4 | 0xa426 | 0x9278 | 0x11e2 | 0x27bc | 0x7d5e | 0x4b00 |
Order | 78 | 79 | 7A | 7B | 7C | 7D | 7E | 7F | 80 | 81 |
Numerical value | 0x3713 | 0x014d | 0x5baf | 0x6df1 | 0xee6b | 0xd835 | 0x82d7 | 0xb489 | 0xa6bc | 0x90e2 |
Order | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 8A | 8B |
Numerical value | 0xca00 | 0xfc5e | 0x7fc4 | 0x499a | 0x1378 | 0x2526 | 0x5935 | 0x6f6b | 0x3589 | 0x03d7 |
Order | 8C | 8D | 8E | 8F | 90 | 91 | 92 | 93 | 94 | 95 |
Numerical value | 0x804d | 0xb613 | 0xecf1 | 0xdaaf | 0x14d7 | 0x2289 | 0x786b | 0x4e35 | 0xcdaf | 0xfbf1 |
Order | 96 | 97 | 98 | 99 | 9A | 9B | 9C | 9D | 9E | 9F |
Numerical value | 0xa113 | 0x974d | 0xeb5e | 0xdd00 | 0x87e2 | 0xb1bc | 0x3226 | 0x0478 | 0x5e9a | 0x68c4 |
Order | A0 | A1 | A2 | A3 | A4 | A5 | A6 | A7 | A8 | A9 |
Numerical value | 0x8f13 | 0xb94d | 0xe3af | 0xd5f1 | 0x566b | 0x6035 | 0x3ad7 | 0x0c89 | 0x709a | 0x46c4 |
Order | AA | AB | AC | AD | AE | AF | B0 | B1 | B2 | B3 |
Numerical value | 0x1c26 | 0x2a78 | 0xa9e2 | 0x9fbc | 0xc55e | 0xf300 | 0x3d78 | 0x0b26 | 0x51c4 | 0x679a |
Order | B4 | B5 | B6 | B7 | B8 | B9 | BA | BB | BC | BD |
Numerical value | 0xe400 | 0xd25e | 0x88bc | 0xbee2 | 0xc2f1 | 0xf4af | 0xae4d | 0x9813 | 0x1b89 | 0x2dd7 |
Order | BE | BF | C0 | C1 | C2 | C3 | C4 | C5 | C6 | C7 |
Numerical value | 0x7735 | 0x416b | 0xf5e2 | 0xc3bc | 0x995e | 0xaf00 | 0x2c9a | 0x1ac4 | 0x4026 | 0x7678 |
Order | C8 | C9 | CA | CB | CC | CD | CE | CF | D0 | D1 |
Numerical value | 0x0a6b | 0x3c35 | 0x66d7 | 0x5089 | 0xd313 | 0xe54d | 0xbfaf | 0x89f1 | 0x4789 | 0x71d7 |
Order | D2 | D3 | D4 | D5 | D6 | D7 | D8 | D9 | DA | DB |
Numerical value | 0x2b35 | 0x1d6b | 0x9ef1 | 0xa8af | 0xf24d | 0xc413 | 0xb800 | 0x8e5e | 0xd4bc | 0xe2e2 |
Order | DC | DD | DE | DF | E0 | E1 | E2 | E3 | E4 | E5 |
Numerical value | 0x6178 | 0x5726 | 0x0dc4 | 0x3b9a | 0xdc4d | 0xea13 | 0xb0f1 | 0x86af | 0x0535 | 0x336b |
Order | E6 | E7 | E8 | E9 | EA | EB | EC | ED | EE | EF |
Numerical value | 0x6989 | 0x5fd7 | 0x23c4 | 0x159a | 0x4f78 | 0x7926 | 0xfabc | 0xcce2 | 0x9600 | 0xa05e |
Order | F0 | F1 | F2 | F3 | F4 | F5 | F6 | F7 | F8 | F9 |
Numerical value | 0x6e26 | 0x5878 | 0x029a | 0x34c4 | 0xb75e | 0x8100 | 0xdbe2 | 0xedbc | 0x91af | 0xa7f1 |
Order | FA | FB | FC | FD | FE | FF | ||||
Numerical value | 0xfd13 | 0xcb4d | 0x48d7 | 0x7e89 | 0x246b | 0x1235 |
The single frames verification data calculation process of this frame blocks of files is as follows:
(1) S1. variable W_CR=00000000 00000000 is performed;i=1;
(2) S2. variable W_CRC1=00000000 00000000, variable W_CRC2=0000000000000000 are performed;
(3) the 1st byte data=10110011 of execution S3. present frame blocks of files, i.e. 0000000010110011, should
Data and variable W_CRC2 carry out XOR, income value N=0000000010110011=0x00B3;
(4) performing the numerical value of 0x00B3 order in S4. cipher table is 0x679a=0110011110011010, by this number
Value and variable W_CRC1 carry out XOR, income value=0110011110011010, preserve, i.e. variable W_CRC=01100111
10011010;
(5) performing S5.i=i+1=2, present frame blocks of files not yet reads complete, goes to S2;
(6) S2. variable W_CRC1=00000000 01100111 (0x0067), variable W_CRC2=00000000 are performed
10011010(0x009a);
(7) the 2nd byte data=01011010 of execution S3. present frame blocks of files, i.e. 0000000001011010, should
Data and variable W_CRC2 carry out XOR, income value N=0000000011000000=0x00C0;
(8) performing the numerical value of 0x00C0 order in S4. cipher table is 0xf5e2=1111010111100010, by this number
Value and variable W_CRC1 carry out XOR, income value=1111010110000101, preserve, i.e. variable W_CRC=11110101
10000101;
(9) performing S5.i=i+1=3, present frame blocks of files has read complete, has gone to S6;
(10) perform S6. the numerical value of variable W_CRC is negated, obtain present frame blocks of files single frames verification data=
00001010 01111010。
Additionally, in the 3rd step, the whole file verification algorithm detailed process for whole program upgrade file is as follows:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, institute
Must be worth and preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise turning
To T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
The present embodiment can be applicable in user power utilization information acquisition system, utilizes the power communication net built up in system
Network, on the basis of existing power information acquisition system function, is automatically obtained the remote upgrade maintenance work to on-site terminal equipment,
Make on-site terminal equipment realize remotely increasing function, the design of optimization system, the user's request of solution continuous renewal, thoroughly overcome biography
The defect of system upgrade method, saves a large amount of manpower and materials.
In addition to the implementation, the present invention can also have other embodiments.All employing equivalents or equivalent transformation shape
The technical scheme become, all falls within the protection domain of application claims.
Claims (9)
1. a user power utilization information acquisition terminal remote upgrade method, is characterized in that, comprises the following steps:
The first step, main website select an acquisition terminal to be current upgrading terminals;
Second step, main website are sent each frame file being split to form in advance by whole program upgrade file to current upgrading terminals by frame
Block and the single frames verification data that through single frames checking algorithm draw corresponding with each frame blocks of files;Current upgrading terminals is by described
Single frames checking algorithm verifies each frame blocks of files;
3rd step, main website send through whole file verification algorithm draw corresponding with whole program upgrade file to current upgrading terminals
Whole file verification data;Current upgrading terminals verifies whole program upgrade file by described whole file verification algorithm;
4th step, current upgrading terminals upgrading processing terminate;Main station judging the most all acquisition terminals upgrading processing terminates, if not
Next acquisition terminal is then selected to be current upgrading terminals and go to second step, if then remote upgrade terminates;
In second step, the single frames checking algorithm detailed process for each frame blocks of files is as follows:
S1. initialize: making variable W_CRC is 16 bits, and each bit value is zero;Make data pointer i=1;
S2. take 8, the left side of variable W_CRC and preserve to variable W_CRC1;Take 8, the right of variable W_CRC and preserve to becoming
Amount W_CRC2;
S3. read the i-th byte data of present frame blocks of files, and these data are carried out XOR, gained with variable W_CRC2
Value is N;
S4. with variable W_CRC1, the numerical value of the n-th sequence in cipher table being carried out XOR, income value preserves to variable W_
CRC;Described cipher table is made up of the hexadecimal values predetermined order of at least 256 >=0x0 and≤0xffff;Described password
The initial sequence number of table is zero;
S5. data pointer i=i+1 is made, it is judged that it is complete whether present frame blocks of files reads, if then going to S6, if otherwise going to
S2;
S6. the numerical value of variable W_CRC is negated, obtain the single frames verification data of present frame blocks of files.
The most according to claim 1, user power utilization information acquisition terminal remote upgrade method, is characterized in that, in the 3rd step, and pin
As follows to the whole file verification algorithm detailed process of whole program upgrade file:
T1. initialize: making variable W_CS is 32 bits, and each bit value is zero;Make data pointer j=1;
T2. the i-th byte data of reading program upgrade file, and these data are done sums and computing with variable W_CS, income value
Preserve to variable W_CS;
T3. data pointer j=j+1 is made, it is judged that it is complete whether program upgrade file reads, if then going to T4, if otherwise going to
T2;
T4. the numerical value of variable W_CS is the whole file verification data of whole program upgrade file.
User power utilization information acquisition terminal remote upgrade method the most according to claim 1 or claim 2, is characterized in that, second step
Detailed process is as follows:
A1. initialize: make frame point k=1, make frame re-transmission frequency n=0;
A2. main website sends kth frame blocks of files to current upgrading terminals, and sends verify through single frames corresponding with kth frame blocks of files
The single frames verification data that algorithm draws;
A3. current upgrading terminals is calculated the single frames verification data of kth frame blocks of files by described single frames checking algorithm, and judges whether
It is consistent with the single frames verification data received;If being consistent, current upgrading terminals returns successfully message to main website, and main website record is current
Upgrading terminals has downloaded kth frame blocks of files, goes to A4;If not corresponding, current upgrading terminals returns, to main website, the request of repeating transmission, main
Station makes frame re-transmission frequency n=n+1, and judges whether n is more than predetermined value, if then main website record current upgrading terminals kth frame
Blocks of files verification exception also goes to the 4th step, if otherwise going to A2;
A4. making frame point k=k+1, main station judging the most all frames blocks of files is sent, if then going to the 3rd step, if
Otherwise go to A2.
The most according to claim 3, user power utilization information acquisition terminal remote upgrade method, is characterized in that, the 3rd step concrete
Process is as follows:
B1. main website to current upgrading terminals send corresponding with whole program upgrade file through whole file verification algorithm draw whole
File verification data;
B2. current upgrading terminals is calculated the whole file verification data of whole program upgrade file by described whole file verification algorithm,
And judge whether to be consistent with the whole file verification data received;If being consistent, go to B3;If not corresponding, main website record currently rises
Level terminal whole file verification exception also goes to the 4th step;
B3. action is restarted in current upgrading terminals execution reset, and is transferred to formally from temporary storage area by program upgrade file
Application area, is then calculated the whole file verification data of whole program upgrade file by described whole file verification algorithm, and
The whole file verification data judged whether and receive are consistent;If being consistent, the current upgrading terminals of main website record upgrades successfully, and goes to
4th step;If not corresponding, main website record current upgrading terminals file transfer exception also goes to the 4th step.
The most according to claim 4, user power utilization information acquisition terminal remote upgrade method, is characterized in that, also includes being positioned at
Main website preparation process before one step, the detailed process of described main website preparation process is as follows:
C1. inquiry acquisition terminal program version, it would be desirable to the acquisition terminal of upgrading lists upgrading terminals inventory in;
C2. option program upgrade file, draws whole file verification data by described whole file verification algorithm;By program upgrade file
It is divided into some frame blocks of files, and draws the single frames verification data of each frame blocks of files by described single frames checking algorithm;
C3. the acquisition terminal communication channel in upgrading terminals inventory is switched to update channel;Go to the first step;
The detailed process of the described first step is: main website selects an acquisition terminal to be current upgrading terminals in upgrading terminals inventory;
Also including being positioned at the main website subsequent processing steps after the 4th step, the detailed process of described main website subsequent processing steps is such as
Under: each acquisition terminal program version in inquiry upgrading terminals inventory, and contrast with the version of this secondary program upgrade file, by version
Contrasting inconsistent acquisition terminal state recording is that upgrade status is abnormal, version contrasts consistent acquisition terminal communication channel and cuts
Shift to information gathering channel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310471577.6A CN103530153B (en) | 2013-10-11 | 2013-10-11 | User power utilization information acquisition terminal remote upgrade method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310471577.6A CN103530153B (en) | 2013-10-11 | 2013-10-11 | User power utilization information acquisition terminal remote upgrade method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103530153A CN103530153A (en) | 2014-01-22 |
CN103530153B true CN103530153B (en) | 2016-08-17 |
Family
ID=49932193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310471577.6A CN103530153B (en) | 2013-10-11 | 2013-10-11 | User power utilization information acquisition terminal remote upgrade method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103530153B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104049996A (en) * | 2014-05-29 | 2014-09-17 | 湖北三江航天红峰控制有限公司 | Method for carrying out software updating of missile-borne computer based on serial port |
CN106453642A (en) * | 2016-11-28 | 2017-02-22 | 国网四川省电力公司眉山供电公司 | Linux dynamic link library-based method of rapidly upgrading electric energy data acquire terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201345041Y (en) * | 2008-09-11 | 2009-11-11 | 周庆民 | Field data acquisition terminal capable of upgrading programs remotely |
CN102541604A (en) * | 2011-12-29 | 2012-07-04 | 深圳市共进电子股份有限公司 | Remote upgrading method, remote upgrading terminal equipment and remote upgrading system |
CN202404574U (en) * | 2011-12-20 | 2012-08-29 | 郑州伊海电气设备有限公司 | Electric energy collecting terminal with remote upgrade function |
CN102857380A (en) * | 2012-09-18 | 2013-01-02 | 珠海中慧微电子有限公司 | Remote upgrading method for power line carrier communication routing |
CN202838671U (en) * | 2012-09-10 | 2013-03-27 | 江阴长仪集团有限公司 | Centralized meter reading terminal supporting remote upgrade and information two-way transmission |
-
2013
- 2013-10-11 CN CN201310471577.6A patent/CN103530153B/en active IP Right Grant
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201345041Y (en) * | 2008-09-11 | 2009-11-11 | 周庆民 | Field data acquisition terminal capable of upgrading programs remotely |
CN202404574U (en) * | 2011-12-20 | 2012-08-29 | 郑州伊海电气设备有限公司 | Electric energy collecting terminal with remote upgrade function |
CN102541604A (en) * | 2011-12-29 | 2012-07-04 | 深圳市共进电子股份有限公司 | Remote upgrading method, remote upgrading terminal equipment and remote upgrading system |
CN202838671U (en) * | 2012-09-10 | 2013-03-27 | 江阴长仪集团有限公司 | Centralized meter reading terminal supporting remote upgrade and information two-way transmission |
CN102857380A (en) * | 2012-09-18 | 2013-01-02 | 珠海中慧微电子有限公司 | Remote upgrading method for power line carrier communication routing |
Also Published As
Publication number | Publication date |
---|---|
CN103530153A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2429126B1 (en) | Systems and methods for the configuration of substation remote terminals with a central controller | |
CN103516541B (en) | Configuration information automatic management method based on Intelligent transformer station | |
CN103379136B (en) | Compression method and decompression method of log acquisition data, compression apparatus and decompression apparatus of log acquisition data | |
CN103457354B (en) | A kind of secondary equipment of intelligent converting station moves O&M method and device thereof | |
CN101888655B (en) | Method and device for configuring network element data in template way in network management system | |
CN103199624B (en) | Smart converting station based on international electrotechnical commission (IEC) 61850 | |
CN104737566B (en) | Method for introducing user ID data in subscriber identity module | |
CN104134173B (en) | Based on the main distribution figure/analog integrated system remotely having access to information exchange | |
CN104394008B (en) | A kind of method and its system of unified configuration different type interchanger | |
CN103326465B (en) | A kind of power distribution network terminal cut-in method based on IEC61850 standard | |
CN104899325A (en) | APP (application) acquired data collection method, terminal, server and system | |
CN102223651B (en) | Method for assisting base station in self starting and RNC (Radio Network Controller)/DHCP (Dynamic Host Configuration Protocol) server | |
CN104243595A (en) | IPv6 (Internet protocol version 6) based electricity information collection system and method | |
CN104065521B (en) | A kind of collection, analysis and the delivery system and its method of electric power networks device log and configuration file | |
CN103869771A (en) | Environment monitoring system | |
CN105391684A (en) | Centralized management method and centralized management device for strategies | |
CN103218398B (en) | Intelligent substation SCL (substation configuration description language) file difference comparison method | |
US10325062B2 (en) | Method and device for generating engineering topology of digital substation | |
CN101848438B (en) | Method for remotely modifying network-locking parameter | |
CN103874113B (en) | Wireless network maintaining method, device and system | |
CN102065413B (en) | Database updating method and system, and base station self-starting method and system | |
CN102185383A (en) | Method and system for realizing data sharing between power distribution main station system and power distribution GIS (Geographic Information System) | |
TWI223520B (en) | Wireless network receiver and method for performing message integrity check of service data unit thereof | |
CN103902763A (en) | Automatic matching method of virtual terminals of cross-interval device of intelligent substation | |
CN1705245A (en) | Authentication and connection method between mobile phones having bluetooth module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
C06 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
C10 | Entry into substantive examination | ||
GR01 | Patent grant | ||
C14 | Grant of patent or utility model |